G06K19/07309—Means for preventing undesired reading or writing from or onto record carriers

G06K19/07363—Means for preventing undesired reading or writing from or onto record carriers by preventing analysis of the circuit, e.g. dynamic or static power analysis or current analysis

H—ELECTRICITY

H01—BASIC ELECTRIC ELEMENTS

H01L—SEMICONDUCTOR DEVICES; ELECTRIC SOLID STATE DEVICES NOT OTHERWISE PROVIDED FOR

H01L23/00—Details of semiconductor or other solid state devices

H01L23/52—Arrangements for conducting electric current within the device in operation from one component to another, i.e. interconnections, e.g. wires, lead frames

H01L23/522—Arrangements for conducting electric current within the device in operation from one component to another, i.e. interconnections, e.g. wires, lead frames including external interconnections consisting of a multilayer structure of conductive and insulating layers inseparably formed on the semiconductor body

H—ELECTRICITY

H01—BASIC ELECTRIC ELEMENTS

H01L—SEMICONDUCTOR DEVICES; ELECTRIC SOLID STATE DEVICES NOT OTHERWISE PROVIDED FOR

H01L23/585—Structural electrical arrangements for semiconductor devices not otherwise provided for, e.g. in combination with batteries comprising conductive layers or plates or strips or rods or rings

H—ELECTRICITY

H01—BASIC ELECTRIC ELEMENTS

H01L—SEMICONDUCTOR DEVICES; ELECTRIC SOLID STATE DEVICES NOT OTHERWISE PROVIDED FOR

H01L2924/00—Indexing scheme for arrangements or methods for connecting or disconnecting semiconductor or solid-state bodies as covered by H01L24/00

H01L2924/0001—Technical content checked by a classifier

H01L2924/0002—Not covered by any one of groups H01L24/00, H01L24/00 and H01L2224/00

Abstract

During the creation of wiring plans for logic modules, the regions which are left free of interconnects by synthesis methods in upper metal planes are filled to a maximum degree with further interconnects. These interconnects serve to protect the integrated circuit. These further interconnects, depending on the availability of components for driving or evaluation, are embodied as sensor interconnects or else as connectionless interconnects only to confuse potential hackers.

Description

CROSS-REFERENCE TO RELATED APPLICATION

This application is a continuation of copending International application PCT/DE01/04198, filed Nov. 8, 2001, which designated the United States and which was not published in English. [0001]

BACKGROUND OF THE INVENTION

1. Field of the Invention [0002]

The invention lies in the integrated technology field. More specifically, the present invention relates to an integrated circuit configuration with a substrate, which has circuit elements, and a wiring plane with interconnects, and also to a method for producing an integrated circuit configuration. [0003]

In integrated circuits, particularly in their use in smart cards and chip cards, it is possible for a potential hacker to perform an analysis of the integrated circuit, so-called “reverse engineering”, and to use the information obtained either to alter the mode of operation of the circuit or to perform a data manipulation in the memory thereof. The process can lead to undesirable consequences particularly in the case of security-relevant circuits, for instance with cash card or access authorization functions. The material covering the chip and also a part of the upper layers protecting the wiring of the chip are typically removed during the analysis. The upper interconnects that are then uncovered are usually non-security-relevant lines which can be bypassed by so-called bypass lines in order to reach farther to deeper layers and lines. With some outlay, these steps can be performed nowadays using the “FIB method” (“Focused Ion Beam”). As soon as deeper, security-relevant and thus critical lines are reached, either signals and pulses can be tapped off on the lines (so-called “probing”), or signals can be applied to these lines in order to manipulate data (so-called “forcing”). [0004]

In the past, therefore, the object has been to prevent or at least render more difficult the analysis and manipulation of the integrated circuits; on the one hand. An attempt to achieve that object has involved concealed structuring of the critical lines in the wiring plan. On the other hand, that object has been tackled by application of a dedicated, covering protective plane above the relevant wiring planes. In the case of these protective planes, called “shields”, meander-shaped or lattice-shaped lines are typically realized e.g. in pairs in the protective plane, in the event of whose interruption or short circuit for the case where different voltages are present the detecting sensor initiates an erasure of the memory, a reset or the non-functionality of other circuit sections. These lines, referred to as “passive” can likewise be embodied as unconnected, voltageless lines. In this case, they serve merely for increasing the complexity during the attack or for the purpose of confusion. [0005]

The security of the modules can be additionally increased by the passive lines described being replaced by so-called active lines in the design of the wiring plan. In the case of the active lines, signals are applied to the lines of the shield by drive circuits, which signals are analyzed by evaluation circuits and compared e.g. with reference signals owing to the possible variation of the signals, in this case the shield can only be circumvented by the very complicated laying of a bypass line by means of the FIB method. [0006]

While integrated circuits of conventional logic modules are created with an essentially manually controlled design (full-custom design), manual processing or influencing is possible only with a relatively high outlay in the case of the synthesized logic that is gaining acceptance to an ever greater extent nowadays. [0007]

In this method, functions and relationships of objects are formulated in a higher programming language, e.g. VHDL, and translated into a finished wiring plan by a compilation program. Since the protection properties of the shield lines result from functions that are independent of the actual circuit and also from their spatial position, but these cannot be fixed a priori in the synthesis method, in the case of that method it is unfortunately only afterwards that the wiring plan can be manually supplemented by protective planes, with outlay, which is in contrast to the desired efficiency and time advantage in the creation of the integrated circuit. [0008]

It is thereby precisely the integrated circuits that are created by a synthesis method that may be particularly vulnerable to hacker attack, because most of the wiring is effected in the deeper layers, while the occupancy with lines becomes less and less in the upper layers. As a result, it is possible for the potential attacker to reach the deep, security-relevant, critical lines directly e.g. from the peak measuring location using needles, without encountering lines lying in upper wiring planes. [0009]

SUMMARY OF THE INVENTION

It is accordingly an object of the invention to provide a integrated circuit configuration and a method for producing such an configuration which overcome the above-mentioned disadvantages of the heretofore-known devices and methods of this general type and which afford a high degree of protection against externally attacking analysis methods in conjunction with low complexity and low costs, particularly for the case where the wiring plan has been created in a synthesis process. With the foregoing and other objects in view there is provided, in accordance with the invention, an integrated circuit configuration, comprising: [0010]

a substrate formed with circuit elements; [0011]

at least one wiring plane formed with first interconnects connecting the circuit elements and disposed to leave free spaces in the wiring plane; and [0012]

second interconnects for protection of the integrated circuit configuration formed in the wiring plane and filling the free spaces in the wiring plane left free by the first interconnects. [0013]

In accordance with an added feature of the invention, there is provided a driving an evaluation circuit connected to the second interconnects, for detecting one of an interruption of the second interconnects, a short circuit of one of the second interconnects with a further interconnect, or a bypass of the second interconnects. [0014]

In accordance with an additional feature of the invention, the at least one wiring plane is one of a plurality of wiring planes, and at least one of the second interconnects extends over at least two of the wiring planes. In accordance with another feature of the invention, one of the second interconnects runs directly below or above one of the first interconnects. [0015]

In a preferred embodiment of the invention, the second interconnects are assigned to active lines. [0016]

With the above and other objects in view there is also provided, in accordance with the invention, a method of producing an integrated circuit configuration as outlined above, i.e., a circuit with a substrate, circuit elements, and at least one wiring plane with first interconnects. The novel method comprises generating a wiring plan for the integrated circuit, and thereby leaving regions of the wiring plane free of first interconnects and filling the regions with second interconnects for protection of the integrated circuit in the wiring plan. [0017]

A chip stack in which the analysis is to be prevented with interconnects is disclosed in the commonly assigned, published patent application U.S. Ser. No. 2003/0,008,432 A1 and international publication WO 00/67319 A1, which are herewith incorporated by reference. [0018]

The present invention proposes an integrated circuit configuration in which a maximum occupancy of interconnects is made possible for each plane by filling the regions which are left free of the interconnects that support the intended function of the integrated circuit with the interconnects that serve for protection of the integrated circuit. On the one hand, for the potential attacker in the case of reverse engineering, this increases the number of interconnects to be examined per wiring plane; on the other hand, the potential attacker cannot ascertain from the outset which interconnects in the wiring plane serve for the actual integrated circuit and which serve only for the protection of this circuit. The advantage thus arises that the filling and the joint positioning of the two assignments of interconnects in a wiring plane leads to a considerably higher complexity in the case of reverse engineering. [0019]

The integrated circuit configuration according to the invention may comprise substrates with active circuit elements and those integrated circuit configurations without active circuit elements that are used e.g. as so-called flip-chips, the latter usually being turned and bonded by the patterned side again onto the structure side of a substrate comprising active circuit elements. These together again produce precisely a circuit configuration according to the invention. [0020]

It shall be expressly pointed out that in this document, according to the present invention, the term circuit elements also encompasses interconnects. Thus, the integrated circuit configuration according to the invention can also be employed in the above-mentioned flip-chips, e.g. merely comprising interconnects, which can accordingly serve as extended protection for a chip comprising active circuit elements. [0021]

The method for producing the configuration according to the present invention proves to be particularly advantageous for integrated circuits created using synthesis methods. Critical interconnects that are possibly not covered by interconnects in upper wiring planes in the synthesis method and are thus uncovered and at a deeper level can be covered, according to the present invention, by filling the left-free regions that lie precisely above the interconnect concerned with the interconnects serving for protection of the integrated circuit, after the end of the synthesis method. However, a conceivable application of the present invention before or during the synthesis method must also be taken into account through this teaching. The configurations and the method according to the present invention are preferably realized by means of a filling program which ideally follows the synthesis method. In addition to the speed advantage, this affords the possibility that by creating a new module version with alterations in the wiring plan of the integrated circuit, a completely new wiring plan of the protective lines is likewise created. Consequently, the analysis for reverse engineering concerns not only the examination of small alterations from one module version to the next, rather it is necessary for the analysis to be carried out completely anew with high outlay. [0022]

Since, in the present integrated circuit configuration, there is no need to provide a dedicated plane for protective interconnects, because the corresponding interconnects are situated in the already wired planes, no additional costs arise for the construction of metal planes. On the other hand, this economic advantage can also be obtained in the case of integrated circuits created in the full-custom design, if the corresponding protective interconnects are filled or placed into left-free regions of the manually assembled library modules or interconnects and supply tracks whilst dispensing with the dedicated protective plane that is usually used in this case. [0023]

A further aspect is constituted by the possible multilayer nature of regions with interconnects for protection of the integrated circuit. In addition to the complexity increase, that is provided by the multilayer nature, it is thus possible to combine different protective mechanisms, such as, for instance, capacitive censor lines in a first plane and signal and sensor lines provided with comparators in a second plane, by which the successive removal of planes and examination of interconnects is advantageously made considerably more difficult. [0024]

Other features which are considered as characteristic for the invention are set forth in the appended claims. [0025]

Although the invention is illustrated and described herein as embodied in integrated circuit configuration with analysis protection and method for producing the configuration, it is nevertheless not intended to be limited to the details shown, since various modifications and structural changes may be made therein without departing from the spirit of the invention and within the scope and range of equivalents of the claims. [0026]

The construction and method of operation of the invention, however, together with additional objects and advantages thereof will be best understood from the following description of specific embodiments when read in connection with the accompanying drawings.[0027]

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1A is a cross section taken through an exemplary circuit configuration, created in a synthesis method, with transistors and interconnects in four metal planes in accordance with the prior art; and [0028]

FIG. 1B is a cross section taken through an exemplary circuit device according to the invention, after filling, i.e., after application of the method according to the invention for producing the circuit configuration. [0029]

DESCRIPTION OF THE PREFERRED EMBODIMENTS

Referring now to the figures of the drawing in detail and first, particularly, to FIG. 1A thereof, there is shown a wiring plan—created by a synthesis method—of a prior art integrated circuit configuration. In the illustrated cross section of the exemplary configuration, three transistors T[0030] 1, T2 and T3 are illustrated on a substrate 9. The transistors T1 and T2 constitute a CMOS inverter. The corresponding gate electrodes G1-G3 and also metal contacts to the source regions S1-S3 and drain regions D1-D3 of the three transistors are situated in an insulating layer 91 lying on the substrate. Situated on this layer is the first metal plane 10 with an insulation layer thereon, with the interconnects 20 serving for the wiring of the components. As is a result of crossovers of the interconnects 20, the latter also have to switch to higher metal planes 11, 12 and 13 that are mutually isolated by insulation layers. It is generally the case that, in particular, supply lines are laid in the topmost metal layers. The VHDL program code reflecting the relationships and modes of operation of the respective components is translated by a compilation program to produce an optimized wiring plan specifying e.g. the shortest possible wiring routes. As a result, the bottommost metal layer 10 is occupied to the greatest extent with interconnects, while this occupancy decreases to a greater extent towards upper metal layers. In this way, regions, 1, 1′ which are left free of interconnects and which widen towards high metal layers are produced in the wiring plan, but the left-free regions 1′ which are not utilized further by the compilation program can also be produced, which are surrounded and enclosed by interconnects.

In the context of this circuit configuration, a potential hacker, for the purpose of attack after removal of the insulation layers between the metal layers [0031] 10-13, could use e.g. needles to get at the safety-relevant interconnects 21 of the transistor T3, which are located in the first metal layer 10, or the interconnects 22 of the transistors T2, T3, which are additionally located in the second metal layer 11, in order to carry out probing or forcing here.

In accordance with the method—on which the present invention is based—for producing the integrated circuit configuration, the regions [0032] 1 which are left free of interconnects e.g. in the synthesis method are filled (i.e., populated) with further interconnects 30 serving for protection of the integrated circuit. This can be done manually but should ideally be realized by a computational filling program which detects the left-free regions and fills them with interconnects while complying with protective functions that are to be prescribed. In this case, regions that are possibly still free on the substrate can be utilized for the components of the sensor lines, such as the transistor T4 shown in FIG. 1B. In this case, the interconnects 30 serving as sensor lines fill the left-free regions 1 as densely as possible in order just by virtue of their position to impede access through needles from a point measurement location or through the FIB method to the critical interconnects 21, 22. As a result of the application of signals to the interconnects 30 by the evaluation and/or drive devices, which comprise e.g. transistors T4, it is possible to check the intactness of the interconnects 30 with respect to short circuit or bypassing by means of a comparison with a reference signal. If the signals are unequal, the evaluation device initiates, say, a reset or erasure of the memory of the integrated circuit.

The potential attack is made particularly more difficult by virtue of a lattice-shaped or meander-shaped shaping of the interconnects [0033] 31, 32. If the orientation of the interconnects 31 in the metal plane 13 is thereby chosen to be perpendicular to the interconnects 32 positioned in the underlying metal plane 12, then it becomes particularly difficult for the potential attacker to get to the underlying lines, since in this case, by cutting out the hole through which the needle or the FIB is intended to reach the interconnect 22, it is necessary to interrupt very many overlying interconnects 31 of the metal plane 13 and interconnects 32 of the metal plane 12, which the potential attacker then has to individually examine or bypass in each case.

A further advantage is afforded by the checking of interconnects of the integrated circuit which lie in upper metal layers by means of underlying interconnects serving for protection purposes. In FIG. 1B, this is illustrated by the interconnect [0034] 23 of the metal plane 12, below which the interconnect 33 runs parallel over the greatest possible length. Specifically, detection of the interruption of the interconnect 33 makes it possible to immediately infer the concurrent interruption of the interconnect 23 or an attack on the latter. It is safe to infer, then, that a hacking event has occurred and a change in the operating mode of the integrated circuit can be initiated by way of the evaluation logic unit.

Even for the case where left-free regions [0035] 11 cannot be reached by drive and/or evaluation devices, it is possible to provide connectionless interconnects 34 that serve only for the purpose of confusion. Furthermore, the generally implemented step of inserting a metal area for the stabilization of layer surfaces becomes superfluous as a result of filling with interconnects. Consequently, the security of the module is advantageously increased in conjunction with no or only little additional outlay.

Claims (11)

I claim:

1. An integrated circuit configuration, comprising:

a substrate formed with circuit elements;

at least one wiring plane formed with first interconnects connecting said circuit elements and disposed to leave free spaces in said wiring plane; and

second interconnects for protection of the integrated circuit configuration formed in said wiring plane and filling said free spaces in said wiring plane left free by said first interconnects.

2. The integrated circuit configuration according to claim 1, which comprises a driving circuit and an evaluation circuit connected to said second interconnects, for detecting one of an interruption of said second interconnects, a short circuit of one of said second interconnects with a further interconnect, or a bypass of said second interconnects.

3. The integrated circuit configuration according to claim 1, wherein said at least one wiring plane is one of a plurality of wiring planes, and at least one of said second interconnects extends over at least two of said wiring planes.

4. The integrated circuit configuration according to claim 3, wherein one of said second interconnects runs directly below or above one of said first interconnects.

5. The integrated circuit configuration according to claim 2, wherein said second interconnects are assigned to active lines.

6. In a method of producing an integrated circuit configuration having a substrate, circuit elements, and at least one wiring plane with first interconnects connecting the circuit elements, the improvement which comprises generating a wiring plan for the integrated circuit, and thereby leaving regions of the wiring plane free of first interconnects and filling the regions with second interconnects for protection of the integrated circuit in the wiring plan.

7. The method according to claim 6, which comprises generating the wiring plan for forming the integrated circuit configuration according to claim 1.

8. The method according to claim 6, which comprises, after the regions of a first wiring plane that are left free have been filled with second interconnects for protection of the integrated circuit,

filling regions of a second wiring plane left free of first interconnects with second interconnects for protection of the integrated circuit; and

producing connections between the interconnects of the first and second wiring planes in overlapping zones of the two regions.

9. The method according to claim 8, which comprising defining an orientation of two interconnects of the circuit configuration that are arranged one above the other perpendicular to one another in the overlapping zones.

10. The method according to claim 6, which further comprises forming driving and evaluation circuits in the substrate and in the wiring planes and connecting the driving and evaluation circuits to the second interconnects for detecting an interruption or a short circuit of one of the second interconnects with a further interconnect.

11. The method according to claim 6, which comprises creating the wiring plan of the integrated circuit based on a synthesis method.

Method for wiring semi-conductor components in order to prevent product piracy and manipulation, semi-conductors component made according to this method and use of said semi-conductor component in a chip card

Method for wiring semi-conductor components in order to prevent product piracy and manipulation, semi-conductors component made according to this method and use of said semi-conductor component in a chip card